biometrics kyle o'meara april 14, 2008. contents introduction specific types of biometrics...
Post on 22-Dec-2015
218 views
TRANSCRIPT
BiometricsBiometrics
Kyle O'Meara
April 14, 2008
ContentsContents
IntroductionSpecific Types of BiometricsExamplesPersonal ExperienceQuestions
IntroductionIntroduction
Greek meaning – life and measuretechnical solution to authenticationCertain techniques predate computersModernized in the 1960's, 1980's systems
went live
Introduction ContinuedIntroduction Continued
Two types of biometrics◦physiological
◦behavioral
Types are used for:◦identification
◦verification
Specific Types Specific Types
FingerprintFace RecognitionIris VerificationVoice RecognitionHandwriting
FingerprintFingerprintLargest market of biometricsOne of the types that predates computersLooks are the friction ridges on finger tips
◦1870's - classifications of loops, whorls, arches
and tents
◦Matching points
Main original use in law and job applicants◦Other ex.: authentication
Optical sensors vs. Swipe
Face RecognitionFace RecognitionOldest identification mechanismsPhoto IDs are always neededExamining the picture
◦Important second form of ID◦Though more importance switches to
authenticity of the ID cardSystem are used, but many negatives
◦Camera position, “Neutral expression”, Deception
◦Positive can do done without user knowledge, but privacy concerns
Iris VerificationIris Verification
Iris is measurably unique
◦easy to detect, doesn't wear out, protectedRandomness & number of degrees of freedomPhenotypicSimpler processing technique than fingerprintsAdvantages: Technically greater certainty of
verification of a person, non-invasiveNegative views: More user cooperation, attempt at
fraud
Voice RecognitionVoice Recognition
Many subproblems: environment, text
dependent system, identify from large set
or verify speakers, real timeSimple technical integrationFraud potential
Handwriting/SignatureHandwriting/Signature
Another mechanism to predate computer
technologyExamining writing vs. using a signature
tabletReliability? Lies in the system/verifier
Performance & FactorsPerformance & Factors
Performance◦False Acceptance Rates◦False Reject Rates
User Factors◦Enrolling people◦Aging◦Acceptance
Education Privacy
Human IDHuman ID Lead by Defense Advanced
Research Projects Agency
(DARPA) Automated biometric
identification technologies to
detect, recognize and identify
humans at great distances protection of homeland
security Face recognition, Gait
classification, Iris Recognition Expected range 500 ft.
LG LP3800 Cell PhoneLG LP3800 Cell Phone
First mobile phone
with fingerprint readerLG phone to be
securely locked, yet
easily unlocked by the
proper personAvoids problems
FBI DatabaseFBI Database
Initiatives to group database of biometrics beyond
digital images of faces, fingerprints and palm patterns Already going on:
◦DOD has data on detainees, citizens and foreigners
◦Pentagon keeps DNA samples 100,000 requests come in daily 55% related to civilian background checks Matching standards of other countries Biggest concern = Privacy
Personal ExperiencePersonal Experience
FingerprintingSignature & Facial Recognition
◦credit cards/debit cards
Questions??